Skip to content
NADIA

IJSIA Vol. 1, No. 1, 2007

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2007
2007
Volume 1, Number 1, 2007 July
    • Authorized Tracking and Tracing for RFID, Ming-Yang Chen, Ching-Nung Yang and Chi-Sung Laih (pp. 1-14).
    • An Efficient and Intelligent Intrusion Detection and Response System using Virtual Private Networks, Firewalls and Packet Filters, Emmanuel Hooper (pp. 15-24).
    • Efficient and Intelligent Network Infrastructure Protection Strategies for Complex Attacks, IDS Evasions, Insertions and Distributed Denial of Service, Emmanuel Hooper (pp. 25-34).
    • Handwritten Signature Watermarking and Extraction Technique Inspired by Principle of Segregation, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay and Poulami Das (pp. 35-44).
    • Protocols for Privacy-Preserving DBSCAN Clustering, Xu Wei-jiang, Huang Liu-sheng, Luo Yong-long, Yao Yi-fei and Jing Wei-wei (pp. 45-56).
    • Autonomy, Heterogeneity, Trust, Security, and Privacy in Mobile P2P Environments, Jari Veijalainen (pp. 57-72).
    • Database Design Scheme for Copyright Protection Using Multimedia Documents Authentication, Jae-Woo Lee (pp. 73-82).
    • A Proposal of Key Management Scheme and Its Operation Using Anonymous Biometrics on ID-based Infrastructure, Akitoshi Izumi, Yoshifumi Ueshige and Kouichi Sakurai (pp. 83-94).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA